Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
d69063a86c406e82e46e5747e5ef8794_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
d69063a86c406e82e46e5747e5ef8794_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
d69063a86c406e82e46e5747e5ef8794
-
SHA1
55511b528dd91aa2b5fc7cd24916103a9ad24a5f
-
SHA256
7126dd06985d20a9411b370715973a5eda642003567fe11aed9848cd25cea415
-
SHA512
1b9a3def2cb145cc645828a7880b76781c25bf8ef8bf66f0c167fb9ccd924400a86b6cb2e51725b6d4297b75825291053d0e97edbc60d109b7d4f66681b881dd
-
SSDEEP
24576:vuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:R9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-5-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2796 wusa.exe 2636 Magnify.exe 1900 rstrui.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2796 wusa.exe 1200 Process not Found 2636 Magnify.exe 1200 Process not Found 1900 rstrui.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Excel\\0MlHjv\\Magnify.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wusa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 rundll32.exe 2600 rundll32.exe 2600 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2936 1200 Process not Found 31 PID 1200 wrote to memory of 2936 1200 Process not Found 31 PID 1200 wrote to memory of 2936 1200 Process not Found 31 PID 1200 wrote to memory of 2796 1200 Process not Found 32 PID 1200 wrote to memory of 2796 1200 Process not Found 32 PID 1200 wrote to memory of 2796 1200 Process not Found 32 PID 1200 wrote to memory of 2580 1200 Process not Found 33 PID 1200 wrote to memory of 2580 1200 Process not Found 33 PID 1200 wrote to memory of 2580 1200 Process not Found 33 PID 1200 wrote to memory of 2636 1200 Process not Found 34 PID 1200 wrote to memory of 2636 1200 Process not Found 34 PID 1200 wrote to memory of 2636 1200 Process not Found 34 PID 1200 wrote to memory of 2816 1200 Process not Found 35 PID 1200 wrote to memory of 2816 1200 Process not Found 35 PID 1200 wrote to memory of 2816 1200 Process not Found 35 PID 1200 wrote to memory of 1900 1200 Process not Found 36 PID 1200 wrote to memory of 1900 1200 Process not Found 36 PID 1200 wrote to memory of 1900 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d69063a86c406e82e46e5747e5ef8794_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
C:\Windows\system32\wusa.exeC:\Windows\system32\wusa.exe1⤵PID:2936
-
C:\Users\Admin\AppData\Local\qgC\wusa.exeC:\Users\Admin\AppData\Local\qgC\wusa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2796
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:2580
-
C:\Users\Admin\AppData\Local\HL9JE\Magnify.exeC:\Users\Admin\AppData\Local\HL9JE\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2636
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Local\jLU\rstrui.exeC:\Users\Admin\AppData\Local\jLU\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD513b1f8042a05894dafc356a3591af6d1
SHA196dbec1a0ba503186dc70a2b01a5b74f08b7c30c
SHA25658672d954e934db00d3471f1524c521c80be866c19838e89a12745a21d8e4b12
SHA512b8939ba100cc157b1f8225168c9137e6481004135e519575f0c5b9d68ecba8d483a0ad3d720ac2660bcc93ff29ea2d4e1f0bc7d4eb203ae7dd2aba6373039984
-
Filesize
1.2MB
MD5ec958478a718b4bb5212c65d1ed95130
SHA1ec4fa40bf79a597f125e4c7330b7b695c1972572
SHA2560306281208da7a3d71efbb12932bd39c09a1dbd793b32fe9c9e637107dcbdb2d
SHA5124fb021b3a99c9c63f643990a6b76bc741439f23e8e25c96c58ed1f0ac82a54ed7a2665327849d8aee03fcad03b874cccb48f15ea8aa0510d8e53433fde22d4f7
-
Filesize
1.2MB
MD5e84d9df7f78a07817effbb58c161a108
SHA1d07f6892ff725251065570f7cadbc6817486a82c
SHA256055523c0b265f614db08989043b369071d5e2481f30a859711925a84f6038129
SHA5121d4f474bcd092739258eaf078e890e81adc1472d80a56b71140503656c67a5c62f2dbfdeb56167090dc877b841481357755cdf902c60d4a03ba3ec403c668aee
-
Filesize
1KB
MD53f03a58d43b75b3f408136a7902fa02e
SHA1c0f7baa2d7b5b6b712efca59bf26ed3def19b454
SHA25624cdb1a6810f899135d63f7c03dfd95b18eca120e7287e150c81095909ac7145
SHA51201eeaa3c235e4be8d83b33e0520a000853e8d30d39e048429a6f3bb6be2b013041b2aac26a6f09fead1e5c5d02231341ee0fcd58ce173b1e8fe418bd2cd0a916
-
Filesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
Filesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
Filesize
300KB
MD5c15b3d813f4382ade98f1892350f21c7
SHA1a45c5abc6751bc8b9041e5e07923fa4fc1b4542b
SHA2568f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3
SHA5126d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c